1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
oksian1 [2.3K]
3 years ago
8

In cell B22, enter a function to calculate the minimum attendance for the year 2022?

Computers and Technology
1 answer:
Brut [27]3 years ago
8 0

<u>Answer:</u>

<em>The user must use min() to attain the desired results. Let us understand the syntax of min() with an example. </em>

<em>Syntax: </em>

<em>min(range)</em> where min is the name of the function and the range specifies the address of cells from which the <em>minimum number needs to be found</em>.  

<em>Eg. min(A1:A8) </em>

This function will scan the values from A1 to A8 and then find the minimum value from the given range of values.

<em>So according to the problem, </em>

<em>B22 = min(range). </em>Provide range for which<em> minimum attendance needs to be calculated. </em>

You might be interested in
Write a function similar to keep_ints like before, but now it takes in a number n and returns a function that has one parameter
lukranit [14]

Answer:

def make_keeper(n):

   """Returns a function which takes one parameter cond and prints

   out all integers 1..i..n where calling cond(i) returns True.

   >>> def is_even(x):

       # Even numbers have remainder 0 when divided by 2.

       return x % 2 == 0

   >>> make_keeper(5)(is_even)

   2

   4

   """

   def fun(cond):

       for i in range(1,n):

           if(cond(i)):

               print(i)

   return fun

Explanation:

  • Define a function called fun that takes cond as input.
  • loop from 1 to n and display the value if it meets the requirement.
5 0
3 years ago
Why do computers need to periodically check the dns for websites you have already visited? enter your answer here?
den301095 [7]

The reason why computers has the need to periodically check for the DNS of websites that an individual has already visited because certain websites can change its IP address and that the individual using it can be directed to a different website that he or she does not know of.

6 0
3 years ago
Who is the first British in Europe ​
Vera_Pavlovna [14]

Answer:

"The British" are people statically from Great Britain in the UK.

7 0
3 years ago
Your team has provisioned an Auto Scaling Groups in a single Region. The Auto Scaling Group at max capacity would total 40 EC2 i
konstantin123 [22]

Answer: There is a vCPU-based on-demand instance limit per region.

Your AWS account has default quotas, formerly referred to as limits, for each AWS service. Unless otherwise noted, each quota is Region-specific. You can request increases for some quotas, and other quotas cannot be increased

Explanation:

6 0
3 years ago
your manager asked you to set up a secure network connection at a remote site to move over some back ups. what protocol what do
Ivan

The protocol that should be used to establish a secure network connection for backups is SSH.

<h3>Secure Shell</h3>

SSH stands for <u>Secure Shell</u>. SSH is a <u>protocol that allows users to remotely control and modify servers</u>. SSH is commonly used by administrators to manage certain systems or applications remotely. So the admin can enter the computer via the network, then run various commands to modify or manage files from one computer to another.

SSH has several crucial functions for managing data transfer traffic. Specifically, the following are the functions and benefits of SSH:

  • Securing remote access to SSH-enabled systems or network devices for the user and processing them automatically.
  • SSH will automatically terminate the connection if there is suspicious activity on the connection used. So you can avoid various cyber threats such as IP and DNS spoofing, data manipulation, illegal tracking, and others.
  • Perform automatic and secure file transfers.
  • Launch commands securely on remote devices or systems.
  • Perform secure component management of network infrastructure.

Learn more about Secure network connection: brainly.com/question/28083478

#SPJ4

8 0
1 year ago
Other questions:
  • Create and apply a css class named bigblue, which selects a large, blue-colored font.
    11·1 answer
  • 11.
    11·1 answer
  • Which of the following statements is false?
    12·1 answer
  • What are the key ideas in dealing with a superior?
    9·1 answer
  • Software as a Service (SaaS) refers to the use of computing resources, including software and data storage, on the Internet rath
    13·1 answer
  • What is the best temperature to set your air conditioner on?
    12·1 answer
  • What do developers do to support software products?
    5·2 answers
  • What should you do if you forget your root password for MySQL?
    13·1 answer
  • Cash cows are always in
    7·1 answer
  • Who invented the first mechanical computer? in what year was it invented?.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!